CVE-2017-6646 - CVE Vulnerability

A vulnerability in the web interface of Cisco Remote Expert Manager Software 11.0.0 could allow an unauthenticated, remote attacker to access sensitive Order information on an affected system. The vulnerability exists because the affected software does not sufficiently protect sensitive data when responding to HTTP requests that are sent to the web interface of the software. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web interface of the software on an affected system. A successful exploit could allow the attacker to access sensitive information about the software. The attacker could use this information to conduct additional reconnaissance attacks. Cisco Bug IDs: CSCvc52866 CSCvc52868. (CVSS:5.0) (Last Update:2017-06-01)

Vulnerability Details :

A vulnerability in the web interface of Cisco Remote Expert Manager Software 11.0.0 could allow an unauthenticated, remote attacker to access sensitive Order information on an affected system. The vulnerability exists because the affected software does not sufficiently protect sensitive data when responding to HTTP requests that are sent to the web interface of the software. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web interface of the software on an affected system. A successful exploit could allow the attacker to access sensitive information about the software. The attacker could use this information to conduct additional reconnaissance attacks. Cisco Bug IDs: CSCvc52866 CSCvc52868. Publish Date : 2017-05-21 Last Update Date : 2017-06-01

- CVSS Scores & Vulnerability Types

CVSS Score

5.0

Confidentiality Impact

Partial(There is considerable informational disclosure.)

Integrity Impact

None(There is no impact to the integrity of the system)

Availability Impact

None(There is no impact to the availability of the system.)

Access Complexity

Low(Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. )

Authentication

Not required(Authentication is not required to exploit the vulnerability.)